To see the other types of publications on this topic, follow the link: Barrier to reverse engineer.

Dissertations / Theses on the topic 'Barrier to reverse engineer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 dissertations / theses for your research on the topic 'Barrier to reverse engineer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Knight, Darren C. "Return on Investment Analysis for Implementing Barriers to Reverse Engineering and Imitation." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2633.

Full text
Abstract:
Reverse engineering (extracting information about a product from the product itself) is a competitive strategy for many firms and is often costly to innovators. Recent research has proven metrics for estimating the reverse engineering time and barrier and has shown that products can strategically be made more difficult to reverse engineer, thus protecting the innovator. Reverse engineering, however, is only the first phase of attempting to duplicate a product. Imitating – the process of discovering how to physically reproduce the performance of the reverse engineered product in one or more of its performance areas – is the second and final phase. This thesis presents metrics for the time and barrier to imitating and shows how they can be joined with reverse engineering metrics to estimate a total time and total barrier to duplicate a product. As there is a cost associated with the design of barriers to reverse engineering and in imitating it is important that a return on investment analysis be performed to ensure a profitable endeavor. Details of such an analysis are presented here. To illustrate the methodology, two case studies are presented. The first is an analysis of KithcenAid's Stand Mixer. The second is an analysis of a cantilevered "L-beam" that has been structurally optimized under four conditions to achieve a specified mechanical performance. Additionally, anecdotal solutions to creating barriers to reverse engineering and imitating are discussed throughout.
APA, Harvard, Vancouver, ISO, and other styles
2

Germann, Christian. "Pricing Multi Barrier Reverse Convertibles." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/97193445002/$FILE/97193445002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Erni, David. "Rendite und Risiko von Barrier Reverse Convertibles." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/04602694001/$FILE/04602694001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lindauer, Thomas. "An Empirical Analysis of (Multi-) Barrier Reverse Convertibles." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/02600518002/$FILE/02600518002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smedberg, Gustav, and Jenny Malmgren. "Is it possible to reverse engineer obfuscated bytecode back to source code?" Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278065.

Full text
Abstract:
AbstractThere are a lot of old software in the world that has not been supported or kept up todate and would need to be updated to seal security vulnerabilities, as well as to updatefunctions in the program. In those cases where the source code has been lost ordeliberately deleted, would it be possible to use reverse engineering to retrieve thesource code?This study aims to show what java bytecode is and how it is used, as well as how oneis able to go from java bytecode back to source code in a process called Reverse Engineering.Furthermore, the study will show previous work in reverse engineering,in obfuscation and to explain further details about what Java Virtual machine,bytecode and obfuscation is and how they work. Three programs of various complexityare made into bytecode and then obfuscated. The difference between the originalcode and the obfuscated code are then analyzed.The results show that it is possible to reverse engineer obfuscated code but someparts. Obfuscation does protect the code, as all the variable names are changed andevery unused method are removed, as well as some methods changed to non-conventionalways to program.KeywordsReverse engineering, Java, JVM, bytecode, obfuscation, safety.
Sammanfattning Det finns mycket gammal mjukvara ute i världen som inte längre underhålls och skulle behöva uppdateras för att kunna täppa säkerhetshål alternativtuppdatera funktioner i dessa program. I fall där källkoden har förlorats ellerraderats , skulle det då vara möjligt att använda dekompilering för att återfåkällkoden? Rapport syftar till att redovisa vad java bytekod är och hur den används samthur man kan gå från java bytekod tillbaka till källkod genom en process somkallas dekompilering samt hur man kan skydda sig mot detta genom obfuskeringav kod. Vidare redovisas tidigare forskning inom dekompilering samtobfuskering och kompletterar med förklaringar vad en Java Virtual Machine,Bytekod och obfuskering är och hur de fungerar. Tre program av varierande komplexitet görs om till bytekod, obfuskeras för att sedan dekompileras ochjämföra resultatet gentemot källkoden. Slutligen, det är möjligt att dekompilera den obfuskerade koden men enbartvissa delar av källkoden går att återskapa. Alla variabelnamn och oanvändametoder försvinner helt samt att koden ibland ändras till icke-konventionellasätt att programmera. Nyckelord Reverse engineering, Java, JVM, bytecode, obfuskering, dekompilering, säkerhet
APA, Harvard, Vancouver, ISO, and other styles
6

Graetzel, Chauncey. "MEMS & high speed vision : development and application to reverse-engineer Drosophila flight control /." Zürich : ETH, 2008. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kunanandam, Visakasuntharam. "Reverse flow of brain interstitial fluid through venular blood-brain barrier." Thesis, University of Hull, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kandikonda, Balausha Varshini. "A Key Based Obfuscation and Anonymization of Behavior VHDL Models." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7686.

Full text
Abstract:
Intellectual Property (IP) based Integrated Circuit (IC) design is an established approach for the design of a complex System-on-Chip (SoC). Porting the preparatory designs to third-party without enough security margin exposes an attacker to perform reverse engineering (RE) on the designs and hence counterfeiting, IP theft etc., are common now-a-days. Design obfuscation can reduce RE attempt by an attacker. In this work, we propose a key based obfuscation and anonymization method for a behavioral IP. Given a behavioral VHDL description, the assignment and conditional statements are modified by incorporating random boolean operations with unique random key bits. The obfuscated VHDL is then anonymized by random identifiers. The resultant behavioral model can be simulated correctly upon application of original key sequence. Simulation results with nine datapath intensive benchmarks with three different lengths of test sequences show that the simulation overhead is negligible (only a few seconds). We evaluate the probability of reverse engineering the obfuscated design and show that it is extremely low.
APA, Harvard, Vancouver, ISO, and other styles
10

Luk-Cyr, Jacques. "Experiments and modeling of multilayered coatings and membranes : application to thermal barrier coatings and reverse osmosis membranes." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93822.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 153-157).
In this thesis, I developed a novel methodology for characterizing interfacial delamination of thermal barrier coatings. The proposed methodology involves novel experiments-plus numerical simulations in order to determine the material parameters describing such failure when the interface is modeled using traction-separation constitutive laws. Furthermore, a coupled fluid-permeation and large deformation theory is proposed for crosslinked polymers with a view towards application to reverse-osmosis. A systematic simulation plus experiment-based methodology is proposed in order to calibrate the material parameters of the theory. Finally, the process of reverse osmosis is studied in the context of water desalination. An experimental set-up is proposed in order to characterize the thin-film composite membranes widely used in the industry, and a preliminary set of experiments are performed.
by Jacques Luk-Cyr.
Part 1. Thermal barrier coatings -- part 2. Reverse osmosis membranes -- part 3. Thin-film-composite membranes: application to reverse osmosis in water desalination.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Liang. "Experimental and Computational Investigation of Thermal-Flow Characteristics of Gas Turbine Reverse-Flow Combustor." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1212.

Full text
Abstract:
Reverse-flow combustors have been used in heavy land-based gas turbines for many decades. A sheath is typically installed to provide cooling at an expense of large pressure losses, through small jet impingement cooling and strong forced convention channel flow. With the modern advancement in metallurgy and thermal-barrier coating technologies, it may become possible to remove this sheath to recover the pressure losses without melting the combustor chamber. However, without the sheath, the flow inside the dump diffuser may exert nonuniform cooling on the combustion chamber. Therefore, the objective of this project is to investigate the flow pattern, pressure drop, and heat transfer in the dump-diffuser reverse-flow combustor with and without sheath to determine if the sheath could be removed. The investigation was conducted through both experimental and computational simulation. The results show that 3.3% pressure losses could be recovered and the highest wall temperature will increase 18% without the sheath.
APA, Harvard, Vancouver, ISO, and other styles
12

Harston, Stephen P. "A Methodology for Designing Product Components with Built-in Barriers to Reverse Engineering." Diss., CLICK HERE for online access, 2009. http://contentdm.lib.byu.edu/ETD/image/etd3060.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Valbasas, Hubertas. "Aparatinės programų apsaugos metodų tyrimas ir paskirstytų skaičiavimų modelio panaudojimas apsaugos rakto realizacijai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_122838-58955.

Full text
Abstract:
Programų apsaugą yra svarbus šių dienų klausimas. 2009 metais pasaulyje buvo užfksuotas 43% piratavimo lygis, o Rytų Europoje 64% lygis. Vienas iš būdų apsaugoti programas nuo neteisėto naudojimo yra aparatiniai apsaugos metodai. Atlikus aparatinių apsaugos metodų analizę nustatyta, kad pažeidžiamiausia apsaugos vieta yra komunikavimas tarp programos ir aparatinio įrenginio, todėl apsaugos raktai, kurie vykdo dalį programos, gali apsaugoti nuo daugumą apgrąžos inžinerijos atakų. Įrodymui buvo sukurtas simuliacinis paskirstytų skaičiavimų aparatinės apsaugos Matlab modelis ir atliktas eksperimentis jo patikrinimas parodė, kad siūlomas apsaugos modelis yra atsparus derinimo ir programos klonavimo atakoms. Tyrimo metu, buvo sukurtas eksperimentinis apsaugos rakto prototipas, kuri vykdo dalį programos, o apsauga ištirta su dviem eksperimentinėmis programomis nuo derinimo, dekompiliavimo ir programos klonavimo atakų. Eksperimentinis tyrimas parodė, kad galima rasti programos kreipinius į apsaugos raktą, tačiau jų apėjimas ar pakeitimas, sugadina programą, praneša apie nežinomus adresus. Taip pat buvo atliktas eksperimetinės programos, apsaugotos komerciniu apsaugos raktu, tyrimas, kuris parodė, kad tradiciniai apsaugos metodai neužtikrina apsaugos nuo apgrąžos inžinerijos, kaip tai buvo įrodyta su eksperimentiniu apsaugos rakto prototipu.
Software protection is important problem of nowaday. In 2009 the piracy rate reaches 43% of all globe softwares usage, especialy high piracy rate is in Eastern Europe, where 64% of softwares are illegal. This brings hardware-based protection to be one of the prime defense against illegal software usage. The analysis of hardware-based software protection showed that the weakest part of hardware-based protection is communication with software, so dongle method, which computes part of the software inside dongle, could withstand most of reverse engineer attack methods. To prove this Matlab model of distributed dongle-based protection scheme was created and its experimental evaluation showed, that suggested software protection model is resistant against deassembling, debbuging and software cloning attacks. Equally, experimental distributed computing protection dongle prototype was created and tested with two experimental programs against deassembling, debbuging, decompilation and software cloning attacks. This shows that attackers can find calls to the dongle, but can not jump or nop it, such it was done in experimental software protected with traditional commercial dongle.
APA, Harvard, Vancouver, ISO, and other styles
14

Rozsíval, Jan. "Využití reverzního inženýrství pro výpočty aerodynamiky automobilu." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2008. http://www.nusl.cz/ntk/nusl-228232.

Full text
Abstract:
The vehicle body was measured by using ATOS 3D scanner. Measured data from the ATOS 3D scanner were applied to make a 3D model of vehicle body and to make a 3D model of whole vehicle by using computer program Pro/ENGINEER. The model of vehicle was made with a view for future use of CAD model. Surface of the vehicle model was used for computation of vehicle aerodynamics – aerodynamic static pressure distribution by using CFD software Star-CCM+.
APA, Harvard, Vancouver, ISO, and other styles
15

Nguyen, Hai Le. "HIV-1 minority variants associated with drug resistance to reverse transcriptase and integrase inhibitors and genetic barrier for the development of resistance to integrase inhibitors." Paris 7, 2012. http://www.theses.fr/2012PA077051.

Full text
Abstract:
Les variants minoritaires résistants (VMR) du VIH-1 aux antirétroviraux n'ont pas été étudiés en Thaïlande. Deux groupes de patients dont le génotypage conventionnel n'a pas montré de mutations associées à la résistance ont été inclus dans l'étude: 104 patients récemment infectés, naïfs de traitement antirétro viral et 22 patients en échec de traitement de première ligne par les inhibiteurs non-nucléosidiques de la transcriptase inverse. Les résultats de pyroséquençage ont montré que la prévalence des variants minoritaires Y181C et M184V dans les 2 groupes est faible en Thaïlande. Le rôle des VMR N155H dans la sélection des profils de résistance au raltégravir (RAL) ont été évalué chez des patients multitraités en échec au RAL. Une PCR allèle spécifique (AS-PCR) a été utilisée pour détecter les mutants N155H. La sélection précoce de cette mutation à des niveaux variés n'influence pas la maintenance de cette mutation pendant l'échec en comparaison avec le passage au double mutant Q148H+Q140S, suggérant que ce mutant N155H n'aurait pas de rôle dans la détermination de profils de résistance. La barrière génétique pour l'évolution de la résistance aux inhibiteurs d'intégrase (INIs) a été comparée entre le sous-type B et CRF01-AE du VIH-1 par l'analyse des 66 mutations associées à la résistance aux INIs dans 144 séquences d'intégrase (109 VIH-1 sous-type CRF01-AE et 35 VIH-1 sous-type B) chez des patients naïfs aux INIs. La plupart des positions d'acides aminés étudiées montrent un haut niveau de conservation, ce qui indique la même barrière génétique entre les sous-types CRF01-AE et B
Minority HIV-1 drug resistance bas not been studied in Thailand. Two groups of patients, whose conventional genotyping results showed no drug resistance-associated mutations, were investigated: 104 homosexual men recently infected with HIV-1, naive to antiretroviral treatment and 22 first-line NNRTI-based failures. Pyrosequencing assay was developed to detect and quantify minority Y181C and M184V variants from the patients' plasma samples. 1/104 (0. 96%) and 3/101 (3%) samples were found harboring Y181C and M184V in the group of homosexual men. In patients with first-line treatment failure, one harbored minority Ml84V mutants (4. 5%). Thus, due to such a low prevalence, minority drug résistance test may not be cost-effective for implementing in Thailand. The mechanism of raltegravir (RAL)-resistant evolutions has not been completely elucidated. Because of the emergence of RAL résistance usually initiated with the N155H mutant, we assessed the role of minority N155H-mutated variants in circulating RNA and archived DNA in 5 heavily treated patients experiencing RAL failure and harboring 3 different résistance profiles. No minority N155H-mutated variant was found by allele specific PCR (AS-PCR) in both plasma and whole blood samples collected at baseline and after RAL withdrawal in ail 5 patients. During RAL failure, the mutation N155H was detected at different levels in 3 patients displaying the N155H pathway and gradually declined when the double mutant Q148H+G140S was selected in one patient. In two patients with the Q148H résistance pathway, no N155H variant was identified by AS-PCR in both viral RNA and DNA. The N155H mutants might not play a role in determining different résistance profiles. The genetic barrier, defined by the accumulative number of drug-associated mutations required for the virus to escape drug-selective pressure, is a crucial factor in the development of drug résistance. There are limited data on subtype CRJF01_AE, a predominant isolate in Southeast Asia. The genetic barrier for the evolution of integrase inhibitors (INIs) including RAL, elvitegravir (EVG), and dolutegravir (DTG) résistance was compared between HIV-1 subtypes B and CRF01_AE by analyzing of 66 substitutions associated with INI résistance at 41 amino acid positions in 144 nucleotide sequences (109 HIV-1 subtype CRF01_AE and 35 HIV-1 subtype B) of IN gene derived from INI-naïve patients. Most studied amino acid positions including ail corresponding to RAL and EVG primary mutations show a high degree of conservation, indicating the same genetic barrier between subtypes CRF01_AE and B. Nevertheless, different genetic barriers were observed in two mutations described to be associated with DTG résistance (L101I, A124T) and other five RAL and EVG secondary mutations (V72I, T125K, G140C/S, V201I), which could have an impact on the development of résistance to RAL, EVG, and DTG
APA, Harvard, Vancouver, ISO, and other styles
16

Sembdner, Philipp. "Rechnergestützte Planung und Rekonstruktion für individuelle Langzeit-Knochenimplantate am Beispiel des Unterkiefers." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-220272.

Full text
Abstract:
Die vorliegende Arbeit befasst sich mit der Entwicklung und Umsetzung von Methoden und Werkzeugen zur Bereitstellung von Modellen und Randbedingungen für die Konstruktion individueller Langzeit-Knochenimplantate (Konstruktionsvorbereitung). Grundlage dabei ist, dass die Planung aus medizinischer Sicht z.B. durch einen Chirurgen und die Konstruktion unter technischen Aspekten z.B. durch einen Konstrukteur getrennt erfolgt. Hierfür wird ein erarbeitetes Planungskonzept vorgestellt, welches sowohl die geplanten geometrischen Merkmale, als auch weiterführende Metadaten beinhaltet (Randbedingungen). Die Übergabe dieser Planungsdaten an die Konstruktion erfolgt über eine dafür entworfene Formatbeschreibung im Kontext der Schnittstelle zwischen Mediziner und Ingenieur. Weiterführend wird die Notwendigkeit von speziellen Funktionen für die Konstruktion von individuellen Implantaten in der Arbeitsumgebung des Konstrukteurs (z.B. Modelliersystem – CAD) am Beispiel der konturlinienbasierten Modellrekonstruktion erörtert. Die gesamtheitliche Basis bildet eine durchgängig digitale Prozesskette zur Datenaufbereitung, Konstruktion und Fertigung. Die Anwendbarkeit der Methoden und zweier umgesetzter Demonstratoren wurde innerhalb eines interdisziplinär angelegten Projektes am realen Patientenfall bestätigt.
APA, Harvard, Vancouver, ISO, and other styles
17

Silva, Luzin?rio Gomes da. "Desenvolvimento de um n?cleo vers?til e integrado de ferramentas CAD/CAE para a modelagem e simula??o de pe?as mec?nicas." Universidade Federal do Rio Grande do Norte, 2012. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15683.

Full text
Abstract:
Made available in DSpace on 2014-12-17T14:58:15Z (GMT). No. of bitstreams: 1 LuzinarioGS_DISSERT.pdf: 1489197 bytes, checksum: c6a09807d24f35bd75cfbad03d10f90b (MD5) Previous issue date: 2012-03-05
Currently there is still a high demand for quality control in manufacturing processes of mechanical parts. This keeps alive the need for the inspection activity of final products ranging from dimensional analysis to chemical composition of products. Usually this task may be done through various nondestructive and destructive methods that ensure the integrity of the parts. The result generated by these modern inspection tools ends up not being able to geometrically define the real damage and, therefore, cannot be properly displayed on a computing environment screen. Virtual 3D visualization may help identify damage that would hardly be detected by any other methods. One may find some commercial softwares that seek to address the stages of a design and simulation of mechanical parts in order to predict possible damages trying to diminish potential undesirable events. However, the challenge of developing softwares capable of integrating the various design activities, product inspection, results of non-destructive testing as well as the simulation of damage still needs the attention of researchers. This was the motivation to conduct a methodological study for implementation of a versatile CAD/CAE computer kernel capable of helping programmers in developing softwares applied to the activities of design and simulation of mechanics parts under stress. In this research it is presented interesting results obtained from the use of the developed kernel showing that it was successfully applied to case studies of design including parts presenting specific geometries, namely: mechanical prostheses, heat exchangers and piping of oil and gas. Finally, the conclusions regarding the experience of merging CAD and CAE theories to develop the kernel, so as to result in a tool adaptable to various applications of the metalworking industry are presented
Com o crescimento das exig?ncias do controle de qualidade na fabrica??o de pe?as mec?nicas, surgiu a atividade de inspe??o de produtos finais, que vai desde a an?lise dimensional ? composi??o qu?mica. Essa tarefa geralmente ? feita atrav?s de diversos m?todos de ensaios n?o destrutivos que minimizam a possibilidade de falhas das pe?as. Os resultados produzidos pelas ferramentas utilizadas nas inspe??es n?o s?o capazes de definir geometricamente um dano (trincas, microtrincas, defeitos de fabrica??o etc.) e, portanto, n?o s?o adequados para a visualiza??o na tela de um computador. Na verdade, t?cnicas de visualiza??o de objetos virtuais em 3D s?o capazes de identificar certos danos que dificilmente seriam detectados por outros m?todos tradicionais. Existem alguns softwares comerciais que buscam auxiliar as etapas de um projeto e simula??o de pe?as mec?nicas no intuito de prever poss?veis danos para tentar mitigar poss?veis eventos indesej?veis (rompimento de pe?as, quebra de equipamentos etc.). Entretanto, o desafio do desenvolvimento de softwares capazes de integrar as v?rias atividades de projeto, inspe??o de produtos, resultados de ensaios n?o destrutivos e simula??es de danos ainda precisa da aten??o de pesquisadores. Dessa forma, fez-se um estudo metodol?gico para a elabora??o de um kernel (n?cleo computacional) piloto do tipo CAD/CAE de grande versatilidade, capaz de auxiliar programadores no desenvolvimento de softwares que usam Engenharia Reversa como base aplicados ?s atividades de projeto e simula??o de casos em que pe?as mec?nicas s?o submetidas a solicita??es diversas. A cria??o do kernel deu-se atrav?s da aplica??o da Computa??o Gr?fica em conjunto com as teorias CAD e CAE e com o aux?lio da realidade virtual. Nesta disserta??o apresentam-se resultados em que o kernel desenvolvido foi aplicado com sucesso a estudos de casos de pe?as com geometrias espec?ficas, a saber: pr?teses mec?nicas, trocadores de calor e tubula??es de petr?leo e g?s. Finalmente, s?o apresentadas as conclus?es referentes ? experi?ncia da hibridiza??o das teorias CAD e CAE para o desenvolvimento do kernel, de forma a resultar numa ferramenta adapt?vel ?s mais diversas aplica??es da ind?stria metal-mec?nica
APA, Harvard, Vancouver, ISO, and other styles
18

Bryan, Paul David. "Accelerating microarchitectural simulation via statistical sampling principles." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/47715.

Full text
Abstract:
The design and evaluation of computer systems rely heavily upon simulation. Simulation is also a major bottleneck in the iterative design process. Applications that may be executed natively on physical systems in a matter of minutes may take weeks or months to simulate. As designs incorporate increasingly higher numbers of processor cores, it is expected the times required to simulate future systems will become an even greater issue. Simulation exhibits a tradeoff between speed and accuracy. By basing experimental procedures upon known statistical methods, the simulation of systems may be dramatically accelerated while retaining reliable methods to estimate error. This thesis focuses on the acceleration of simulation through statistical processes. The first two techniques discussed in this thesis focus on accelerating single-threaded simulation via cluster sampling. Cluster sampling extracts multiple groups of contiguous population elements to form a sample. This thesis introduces techniques to reduce sampling and non-sampling bias components, which must be reduced for sample measurements to be reliable. Non-sampling bias is reduced through the Reverse State Reconstruction algorithm, which removes ineffectual instructions from the skipped instruction stream between simulated clusters. Sampling bias is reduced via the Single Pass Sampling Regimen Design Process, which guides the user towards selected representative sampling regimens. Unfortunately, the extension of cluster sampling to include multi-threaded architectures is non-trivial and raises many interesting challenges. Overcoming these challenges will be discussed. This thesis also introduces thread skew, a useful metric that quantitatively measures the non-sampling bias associated with divergent thread progressions at the beginning of a sampling unit. Finally, the Barrier Interval Simulation method is discussed as a technique to dramatically decrease the simulation times of certain classes of multi-threaded programs. It segments a program into discrete intervals, separated by barriers, which are leveraged to avoid many of the challenges that prevent multi-threaded sampling.
APA, Harvard, Vancouver, ISO, and other styles
19

zhang, xiangyu. "ORACLE GUIDED INCREMENTAL SAT SOLVING TO REVERSE ENGINEER CAMOUFLAGED CIRCUITS." 2017. https://scholarworks.umass.edu/masters_theses_2/551.

Full text
Abstract:
This study comprises two tasks. The first is to implement gate-level circuit camouflage techniques. The second is to implement the Oracle-guided incremental de-camouflage algorithm and apply it to the camouflaged designs. The circuit camouflage algorithms are implemented in Python, and the Oracle- guided incremental de-camouflage algorithm is implemented in C++. During this study, I evaluate the Oracle-guided de-camouflage tool (Solver, in short) performance by de-obfuscating the ISCAS-85 combinational benchmarks, which are camouflaged by the camouflage algorithms. The results show that Solver is able to efficiently de-obfuscate the ISCAS-85 benchmarks regardless of camouflaging style, and is able to do so 10.5x faster than the best existing approaches. And, based on Solver, this study also measures the de-obfuscation runtime for each camouflage style.
APA, Harvard, Vancouver, ISO, and other styles
20

Serrão, Francisco Miguel Gouveia. "SMART: Static and Dynamic Analysis to Reverse Engineer Android Applications." Master's thesis, 2021. https://hdl.handle.net/10216/136085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Barbosa, Joana Margarida de Sousa. "Are structured products fairly priced?: Barrier reverse convertibles and turbo warrants in the Swiss market." Master's thesis, 2020. http://hdl.handle.net/10071/21625.

Full text
Abstract:
The investments in structured products have been increasing in the past few years and, jointly, also the complexity of such products has substantially intensified. In accordance, this thesis was developed with the objective to present the current status of the structured products market, namely in Switzerland, as it is the one of the most developed markets in Europe. Hence, it was analysed a sample of Barrier Reverse Convertibles and Turbo Warrants issued by the biggest Swiss financial institutions, which will permit a clear overview of the price fairness of these financial derivatives and, consequently, support more accurate and informed investment decisions. In fact, this thesis was based on previous studies which revealed that the vast majority of this type of products is substantially overpriced. Thus, besides than presenting a practical overview of this reality, other main objective was to understand the reasons and motivations of investors that could justify the increasing demand for such products. Based on the theoretical price obtained using the Black & Scholes (1973) and Merton (1973) model, and comparing that value with the market price, it was possible to conclude that, in general, all products presented an overprice considered economically relevant, being Barrier Reverse Convertibles typically more overpriced than Turbo Warrants. Regarding the main issuers of each type of product, Bank Vontobel was the financial institution with most fairly priced products related to Turbo Warrants, while Bank Julius Baer should be the safest choice for investments in Barrier Reverse Convertibles.
Os investimentos em produtos estruturados têm vindo a aumentar nos últimos anos e, a par dessa evolução, também a complexidade desses produtos se tem intensificado substancialmente. Neste sentido, esta dissertação foi desenvolvida com o objetivo de retratar o estado atual do mercado de produtos estruturados, nomeadamente na Suíça, por ser um dos mercados mais desenvolvidos da Europa. Deste modo, foi analisada uma amostra de Barrier Reverse Convertibles e Turbo Warrants emitidos pelas maiores instituições financeiras suíças, o que permitirá uma visão clara dos preços destes derivados financeiros e, consequentemente, suportar decisões de investimento mais precisas e informadas. A presente tese foi baseada em estudos anteriores, os quais revelaram que o preço da grande maioria deste tipo de produtos está substancialmente inflacionado. Assim, além de apresentar resultados práticos e representativos dessa realidade, outro objetivo principal passou também por entender as razões e motivações dos investidores que justificar o aumento da procura de tais produtos. Com base no preço teórico obtido pelo modelo Black & Scholes (1973) e Merton (1973), e comparando esse valor com o preço de mercado, foi possível concluir que, em geral, todos os produtos apresentaram uma inflação de preço considerada economicamente relevante, sendo este resultado mais evidente em Barrier Reverse Covertibles comparativamente a Turbo Warrants. Em relação aos principais emissores de cada tipo de produto, o Banco Vontobel foi a instituição financeira com preços mais justos, relativamente a Turbo Warrants, enquanto o Banco Julius Baer deverá ser a escolha mais segura para investimentos em Barrier Reverse Convertibles.
APA, Harvard, Vancouver, ISO, and other styles
22

Ke, Tsung-Yu, and 柯宗佑. "A 600V AlGaN/GaN Schottky Barrier Diode(SBD)on Si Substrate with Fast Reverse Recovery Time." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/57545138488455527148.

Full text
Abstract:
碩士
國立中央大學
電機工程研究所
99
Lateral AlGaN/GaN Schottky Barrier Diodes (SBDs) on Si substrate have been fabricated and characterized. AlGaN/GaN hetero-junction layers were grown on 4-inch p-type Si (111) substrate with 2 ?m buffer layer. The measurement of etching pit density (EPD) of GaN films on Si substrate is about 1.92×109 cm-2 by atomic force microscopy (AFM). The full width at half maximum value (FWHM) of x-ray diffraction rocking curve for the GaN film on Si (111) substrate is 536 arc-sec (002 reflection), which is related to the screw type dislocation and resulted leakage current. The Hall measurement showed the mobility of 1430 cm2 /V-s with a sheet carrier density of 9.8?1012 cm-2 for the AlGaN/GaN structure across the wafer. The AlGaN/GaN SBDs were implemented by Ti/Al/Ni/Au Ohmic and Ni/Au Schottky contacts. The Ohmic contacts were deposited on both side of Schottky contact with equal distance. The Schottky-to-Ohmic contact distance (LGS) was varied from 10 to 30 ?m in this study. The specific on-state resistance (RON) was 1.3 m?-cm2, while the forward turn-on voltage was 1.4 V at the current density of 100 A/cm2 for device with LGS = 10 ?m. The measured reverse breakdown voltage (VB) at room temperature was up to 600 V without edge terminal scheme. The measured VB is not function of LGS, which mainly depends on the buffer layer structure. The figure-of-merit is defined (VB)2/RON, that was 277 MWcm-2. And reverse recovery time was < 10 ns for device (without package) switched from a forward current density of ~720 A/cm2 (1 A) to a reverse bias of 30 V with di/dt of 100 A/?s.
APA, Harvard, Vancouver, ISO, and other styles
23

Jonathas, David. "Modeling of nucleation rate of supersaturated calcium sulfate solutions." 2012. http://hdl.handle.net/10150/252172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sembdner, Philipp. "Rechnergestützte Planung und Rekonstruktion für individuelle Langzeit-Knochenimplantate am Beispiel des Unterkiefers." Doctoral thesis, 2016. https://tud.qucosa.de/id/qucosa%3A30198.

Full text
Abstract:
Die vorliegende Arbeit befasst sich mit der Entwicklung und Umsetzung von Methoden und Werkzeugen zur Bereitstellung von Modellen und Randbedingungen für die Konstruktion individueller Langzeit-Knochenimplantate (Konstruktionsvorbereitung). Grundlage dabei ist, dass die Planung aus medizinischer Sicht z.B. durch einen Chirurgen und die Konstruktion unter technischen Aspekten z.B. durch einen Konstrukteur getrennt erfolgt. Hierfür wird ein erarbeitetes Planungskonzept vorgestellt, welches sowohl die geplanten geometrischen Merkmale, als auch weiterführende Metadaten beinhaltet (Randbedingungen). Die Übergabe dieser Planungsdaten an die Konstruktion erfolgt über eine dafür entworfene Formatbeschreibung im Kontext der Schnittstelle zwischen Mediziner und Ingenieur. Weiterführend wird die Notwendigkeit von speziellen Funktionen für die Konstruktion von individuellen Implantaten in der Arbeitsumgebung des Konstrukteurs (z.B. Modelliersystem – CAD) am Beispiel der konturlinienbasierten Modellrekonstruktion erörtert. Die gesamtheitliche Basis bildet eine durchgängig digitale Prozesskette zur Datenaufbereitung, Konstruktion und Fertigung. Die Anwendbarkeit der Methoden und zweier umgesetzter Demonstratoren wurde innerhalb eines interdisziplinär angelegten Projektes am realen Patientenfall bestätigt.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography